Gentoo Logo

nbd: Multiple vulnerabilities

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201206-35 / nbd
Release Date June 25, 2012
Latest Revision June 25, 2012: 1
Impact high
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
sys-block/nbd < 2.9.22 >= 2.9.22 All supported architectures

Related bugreports: #353097, #372891

Synopsis

Multiple vulnerabilities were found in nbd, which could lead to remote execution of arbitrary code.

2.  Impact Information

Background

nbd is a userland client/server for kernel network block device.

Description

Multiple vulnerabilities have been discovered in nbd. Please review the CVE identifiers referenced below for details.

Impact

nbd allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or the execution of arbitrary code.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All nbd users should upgrade to the latest version:

Code Listing 3.1: Resolution

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-block/nbd-2.9.22"

4.  References



Print

Page updated June 25, 2012

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.